Abnormal provides total protection against the widest range of attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Email Security β’ Business Email Security β’ Cloud Email Security β’ Phishing Detection β’ Business Email Compromise
501 - 1000 employees
February 19
Abnormal provides total protection against the widest range of attacks including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.
Email Security β’ Business Email Security β’ Cloud Email Security β’ Phishing Detection β’ Business Email Compromise
501 - 1000 employees
β’ Abnormal Security is looking for a Threat Intelligence Analyst with expertise in threat hunting, detection engineering, and operational intelligence to combat cloud-based phishing attacks, account takeovers (ATO), and business email compromise (BEC). β’ In this role, you will perform threat hunts in Cloud/SaaS environments, extract actionable intelligence, and collaborate with R&D and Engineering teams to enhance security detections and counter evolving adversary tactics. β’ Perform threat hunting and investigative research in Cloud/SaaS environments, focusing on email security, phishing, and account takeovers. β’ Identify MFA bypass techniques, phishing infrastructure, and cloud-native attack methods targeting enterprise SaaS environments. β’ Track and analyze threat actor groups, phishing campaigns, and cloud-based attack methodologies.
β’ Deep Expertise: 5+ years in cyber threat intelligence, threat hunting, or security research. β’ 3+ years of experience in threat hunting and threat research within cloud ecosystems. β’ Expertise in cloud security, SaaS-based attacks, and email security threats (ATO, BEC, phishing, MFA bypass, etc.). β’ Strong data analysis skills with experience using SQL, PySpark, or other query languages to investigate large-scale threats. β’ Deep understanding of MITRE ATT&CK, phishing tactics, and adversary infrastructure analysis. β’ Hands-on experience with email security platforms, cloud threat analytics, and security automation. β’ Collaborative Mindset: Ability to work cross-functionally with other departments such as R&D, Engineering, and Operations to achieve comprehensive cybersecurity coverage.
Apply NowFebruary 15
Help safeguard information systems as an Information Security Analyst for our clientβs security posture.
November 20, 2024
Analyze security findings and communicate with researchers for client vulnerability reports. Contribute to bug bounty processes and improve delivery quality.
Discover 100,000+ Remote Jobs!
We use powerful scraping tech to scan the internet for thousands of remote jobs daily. It operates 24/7 and costs us to operate, so we charge for access to keep the site running.
Of course! You can cancel your subscription at any time with no hidden fees or penalties. Once canceled, youβll still have access until the end of your current billing period.
Other job boards only have jobs from companies that pay to post. This means that you miss out on jobs from companies that don't want to pay. On the other hand, Remote Rocketship scrapes the internet for jobs and doesn't accept payments from companies. This means we have thousands more jobs!
New jobs are constantly being posted. We check each company website every day to ensure we have the most up-to-date job listings.
Yes! Weβre always looking to expand our listings and appreciate any suggestions from our community. Just send an email to Lior@remoterocketship.com. I read every request.
Remote Rocketship is a solo project by me, Lior Neu-ner. I built this website for my wife when she was looking for a job! She was having a hard time finding remote jobs, so I decided to build her a tool that would search the internet for her.